Home | History | Annotate | Download | only in browser
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #ifndef CHROME_BROWSER_CERTIFICATE_MANAGER_MODEL_H_
      6 #define CHROME_BROWSER_CERTIFICATE_MANAGER_MODEL_H_
      7 
      8 #include <map>
      9 #include <string>
     10 
     11 #include "base/callback.h"
     12 #include "base/memory/ref_counted.h"
     13 #include "base/memory/scoped_ptr.h"
     14 #include "base/strings/string16.h"
     15 #include "net/cert/nss_cert_database.h"
     16 
     17 namespace content {
     18 class BrowserContext;
     19 class ResourceContext;
     20 }  // namespace content
     21 
     22 // CertificateManagerModel provides the data to be displayed in the certificate
     23 // manager dialog, and processes changes from the view.
     24 class CertificateManagerModel {
     25  public:
     26   // Map from the subject organization name to the list of certs from that
     27   // organization.  If a cert does not have an organization name, the
     28   // subject's CertPrincipal::GetDisplayName() value is used instead.
     29   typedef std::map<std::string, net::CertificateList> OrgGroupingMap;
     30 
     31   typedef base::Callback<void(scoped_ptr<CertificateManagerModel>)>
     32       CreationCallback;
     33 
     34   // Enumeration of the possible columns in the certificate manager tree view.
     35   enum Column {
     36     COL_SUBJECT_NAME,
     37     COL_CERTIFICATE_STORE,
     38     COL_SERIAL_NUMBER,
     39     COL_EXPIRES_ON,
     40   };
     41 
     42   class Observer {
     43    public:
     44     // Called to notify the view that the certificate list has been refreshed.
     45     // TODO(mattm): do a more granular updating strategy?  Maybe retrieve new
     46     // list of certs, diff against past list, and then notify of the changes?
     47     virtual void CertificatesRefreshed() = 0;
     48   };
     49 
     50   // Creates a CertificateManagerModel. The model will be passed to the callback
     51   // when it is ready. The caller must ensure the model does not outlive the
     52   // |browser_context|.
     53   static void Create(content::BrowserContext* browser_context,
     54                      Observer* observer,
     55                      const CreationCallback& callback);
     56 
     57   ~CertificateManagerModel();
     58 
     59   bool is_user_db_available() const { return is_user_db_available_; }
     60   bool is_tpm_available() const { return is_tpm_available_; }
     61 
     62   // Accessor for read-only access to the underlying NSSCertDatabase.
     63   const net::NSSCertDatabase* cert_db() const { return cert_db_; }
     64 
     65   // Trigger a refresh of the list of certs, unlock any slots if necessary.
     66   // Following this call, the observer CertificatesRefreshed method will be
     67   // called so the view can call FilterAndBuildOrgGroupingMap as necessary to
     68   // refresh its tree views.
     69   void Refresh();
     70 
     71   // Fill |map| with the certificates matching |filter_type|.
     72   void FilterAndBuildOrgGroupingMap(net::CertType filter_type,
     73                                     OrgGroupingMap* map) const;
     74 
     75   // Get the data to be displayed in |column| for the given |cert|.
     76   base::string16 GetColumnText(const net::X509Certificate& cert, Column column) const;
     77 
     78   // Import private keys and certificates from PKCS #12 encoded
     79   // |data|, using the given |password|. If |is_extractable| is false,
     80   // mark the private key as unextractable from the module.
     81   // Returns a net error code on failure.
     82   int ImportFromPKCS12(net::CryptoModule* module, const std::string& data,
     83                        const base::string16& password, bool is_extractable);
     84 
     85   // Import CA certificates.
     86   // Tries to import all the certificates given.  The root will be trusted
     87   // according to |trust_bits|.  Any certificates that could not be imported
     88   // will be listed in |not_imported|.
     89   // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase.
     90   // Returns false if there is an internal error, otherwise true is returned and
     91   // |not_imported| should be checked for any certificates that were not
     92   // imported.
     93   bool ImportCACerts(const net::CertificateList& certificates,
     94                      net::NSSCertDatabase::TrustBits trust_bits,
     95                      net::NSSCertDatabase::ImportCertFailureList* not_imported);
     96 
     97   // Import server certificate.  The first cert should be the server cert.  Any
     98   // additional certs should be intermediate/CA certs and will be imported but
     99   // not given any trust.
    100   // Any certificates that could not be imported will be listed in
    101   // |not_imported|.
    102   // |trust_bits| can be set to explicitly trust or distrust the certificate, or
    103   // use TRUST_DEFAULT to inherit trust as normal.
    104   // Returns false if there is an internal error, otherwise true is returned and
    105   // |not_imported| should be checked for any certificates that were not
    106   // imported.
    107   bool ImportServerCert(
    108       const net::CertificateList& certificates,
    109       net::NSSCertDatabase::TrustBits trust_bits,
    110       net::NSSCertDatabase::ImportCertFailureList* not_imported);
    111 
    112   // Set trust values for certificate.
    113   // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase.
    114   // Returns true on success or false on failure.
    115   bool SetCertTrust(const net::X509Certificate* cert,
    116                     net::CertType type,
    117                     net::NSSCertDatabase::TrustBits trust_bits);
    118 
    119   // Delete the cert.  Returns true on success.  |cert| is still valid when this
    120   // function returns.
    121   bool Delete(net::X509Certificate* cert);
    122 
    123   // IsHardwareBacked returns true if |cert| is hardware backed.
    124   bool IsHardwareBacked(const net::X509Certificate* cert) const;
    125 
    126  private:
    127   CertificateManagerModel(net::NSSCertDatabase* nss_cert_database,
    128                           bool is_user_db_available,
    129                           bool is_tpm_available,
    130                           Observer* observer);
    131 
    132   // Methods used during initialization, see the comment at the top of the .cc
    133   // file for details.
    134   static void DidGetCertDBOnUIThread(
    135       net::NSSCertDatabase* cert_db,
    136       bool is_user_db_available,
    137       bool is_tpm_available,
    138       CertificateManagerModel::Observer* observer,
    139       const CreationCallback& callback);
    140   static void DidGetCertDBOnIOThread(
    141       CertificateManagerModel::Observer* observer,
    142       const CreationCallback& callback,
    143       net::NSSCertDatabase* cert_db);
    144   static void GetCertDBOnIOThread(content::ResourceContext* context,
    145                                   CertificateManagerModel::Observer* observer,
    146                                   const CreationCallback& callback);
    147 
    148   // Callback used by Refresh() for when the cert slots have been unlocked.
    149   // This method does the actual refreshing.
    150   void RefreshSlotsUnlocked();
    151 
    152   net::NSSCertDatabase* cert_db_;
    153   net::CertificateList cert_list_;
    154   // Whether the certificate database has a public slot associated with the
    155   // profile. If not set, importing certificates is not allowed with this model.
    156   bool is_user_db_available_;
    157   bool is_tpm_available_;
    158 
    159   // The observer to notify when certificate list is refreshed.
    160   Observer* observer_;
    161 
    162   DISALLOW_COPY_AND_ASSIGN(CertificateManagerModel);
    163 };
    164 
    165 #endif  // CHROME_BROWSER_CERTIFICATE_MANAGER_MODEL_H_
    166